This paper presents a methodology for setting fees for the renewal or extension of spectrum licences, by using the outcome of an auction for comparable licences but with a different licence period. The methodology is a combination of market and cash flow valuation and consists of two main steps. First, prices for spectrum corresponding to that of the licences to be extended are derived from the auction outcome. Second, the relative value addition of the extension period for the new licensee, compared to the value of the licences auctioned, is derived by using a model for the development of EBITDA for an operator over time. A combination of these two is used to calculate fees that match the opportunity costs of extension. Thus, optimum alignment is achieved with the policy objective of using licence fees only to promote efficient use of spectrum, while avoiding state aid at the same time.

This paper presents a methodology for setting fees for the renewal or extension of spectrum licences, by using the outcome of an auction for comparable licences but with a different licence period. The methodology is a combination of market and cash flow valuation and consists of two main steps. First, prices for spectrum corresponding to that of the licences to be extended are derived from the auction outcome. Second, the relative value addition of the extension period for the new licensee, compared to the value of the licences auctioned, is derived by using a model for the development of EBITDA for an operator over time. A combination of these two is used to calculate fees that match the opportunity costs of extension. Thus, optimum alignment is achieved with the policy objective of using licence fees only to promote efficient use of spectrum, while avoiding state aid at the same time.

In the fight against unauthorised sharing of copyright protected material, Dutch Internet Service Providers have been summoned by courts to block their subscribers' access to The Pirate Bay and related sites. This paper studies the effectiveness of this approach towards online copyright enforcement, using both a consumer survey and a newly developed non-infringing technology for BitTorrent monitoring. While a small group of respondents download less from illegal sources or claim to have stopped doing so, no impact is found on the percentage of the Dutch population downloading from illegal sources. Slight changes are found on the distribution of Dutch peers, but these seem related to the awareness raised by blocking rather than the blocking itself.

<p>
In the fight against unauthorised sharing of copyright protected material, Dutch Internet Service Providers have been summoned by courts to block their subscribers' access to The Pirate Bay and related sites. This paper studies the effectiveness of this approach towards online copyright enforcement, using both a consumer survey and a newly developed non-infringing technology for BitTorrent monitoring. While a small group of respondents download less from illegal sources or claim to have stopped doing so, no impact is found on the percentage of the Dutch population downloading from illegal sources. Slight changes are found on the distribution of Dutch peers, but these seem related to the awareness raised by blocking rather than the blocking itself.</p>

Recent breaches and malpractices at several Certificate Authorities (CA’s) have led to a global collapse of trust in these central mediators of Hypertext Transfer Protocol Secure (HTTPS) communications. Given our dependence on secure web browsing, the security of HTTPS has become a top priority in telecommunications policy. In June 2012, the European Commission proposed a new Regulation on eSignatures. As the HTTPS ecosystem is by and large unregulated across the world, the proposal presents a paradigm shift in the governance of HTTPS. This paper examines if, and if so, how the European regulatory framework should legitimately address the systemic vulnerabilities of the HTTPS ecosystem. To this end, the HTTPS authentication model is conceptualised using actor-based value chain analysis and the systemic vulnerabilities of the HTTPs ecosystem are described through the lens of several landmark breaches. The paper explores the rationales for regulatory intervention, discusses the proposed EU eSignatures Regulation and ultimately develops a conceptual framework for HTTPS governance. It apprises the incentive structure of the entire HTTPS authentication value chain, untangles the concept of information security and connects its balancing of public and private interests to underlying values, in particular constitutional rights such as privacy, communications secrecy and freedom of expression. On the short term, specific regulatory measures to be considered throughout the value chain includes proportional liability provisions, meaningful security breach notifications and internal security requirements, but both legitimacy and effectiveness will depend on the exact wording of the regulatory provisions. The EU eSignatures proposal falls short on many of these aspects. In the long term, a robust technical and policy overhaul is needed to address the systemic weaknesses of HTTPS, as each CA is a single point of failure for the security of the entire ecosystem.

Recent breaches and malpractices at several Certificate Authorities (CA’s) have led to a global collapse of trust in these central mediators of Hypertext Transfer Protocol Secure (HTTPS) communications. Given our dependence on secure web browsing, the security of HTTPS has become a top priority in telecommunications policy. In June 2012, the European Commission proposed a new Regulation on eSignatures. As the HTTPS ecosystem is by and large unregulated across the world, the proposal presents a paradigm shift in the governance of HTTPS. This paper examines if, and if so, how the European regulatory framework should legitimately address the systemic vulnerabilities of the HTTPS ecosystem. To this end, the HTTPS authentication model is conceptualised using actor-based value chain analysis and the systemic vulnerabilities of the HTTPs ecosystem are described through the lens of several landmark breaches. The paper explores the rationales for regulatory intervention, discusses the proposed EU eSignatures Regulation and ultimately develops a conceptual framework for HTTPS governance. It apprises the incentive structure of the entire HTTPS authentication value chain, untangles the concept of information security and connects its balancing of public and private interests to underlying values, in particular constitutional rights such as privacy, communications secrecy and freedom of expression. On the short term, specific regulatory measures to be considered throughout the value chain includes proportional liability provisions, meaningful security breach notifications and internal security requirements, but both legitimacy and effectiveness will depend on the exact wording of the regulatory provisions. The EU eSignatures proposal falls short on many of these aspects. In the long term, a robust technical and policy overhaul is needed to address the systemic weaknesses of HTTPS, as each CA is a single point of failure for the security of the entire ecosystem.